Re: amazon vpc question

if you're talking about vdiscovery, this works through specific AWS IAM accounts and is rights based. As long as the vdiscovery member can access the service endpoint which is public then no problem. If we're talking about a CPA appliance, API proxied calls are network routed. once the API calls hit the target CPA appliance the grid takes over and is pure networking. The CPA appliance will also queue in the event there is a hicup or lapse in access to the GM.

Re: amazon vpc question

To add to this- if spinning up an instance using API proxy (whether it be through your Grid Master or a CP (Cloud Platform) appliance, you would specify the VPC that the instance should be launched in. For vDiscovery, this is reported on during the vDiscovery process and is learned automatically so nothing is required in order for NIOS to learn this.

Re: amazon vpc question

This thread does not specify what is not working or what the exact problem is. There are multiple areas that Infoblox operates in for AWS and each feature may have its own solution, so there is no simple answer to provide here.

For DNS, the most common practice is to deploy an Infoblox appliance in a 'shared services' VPC and EC2 instances in other VPC's (even in separate accounts) would be able to resolve through the Infoblox appliance(s) as long as network connectivity works, such as when using basic routing or VPC peering.

If you are struggling with something else, or have a particular use case that you are concerned about, be sure to elaborate on that and I'm sure you can get the help that you are looking for. Infoblox Support will also be another helpful resource for you.

To get the best possible help, I would recommend posting this in its own thread. Just be sure to be specific about what you are looking for help with as that is not entirely clear here. Are you asking for what ports need to be allowed in AWS for a certain application? All ports used by Infoblox are documented in the NIOS Administrators Guide so you might find that to be a helpful resource when setting up security groups.